# Imported from Wycheproof's x25519_test.json. # This file is generated by convert_wycheproof.go. Do not edit by hand. # # Algorithm: X25519 # Generator version: 0.4.12 [curve = curve25519] # tcId = 1 # normal case curve = curve25519 private = 4852834d9d6b77dadeabaaf2e11dca66d19fe74993a7bec36c6e16a0983feaba public = 9c647d9ae589b9f58fdc3ca4947efbc915c4b2e08e744a0edf469dac59c8f85a result = valid shared = 87b7f212b627f7a54ca5e0bcdaddd5389d9de6156cdbcf8ebe14ffbcfb436551 # tcId = 2 # normal case curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = 9c647d9ae589b9f58fdc3ca4947efbc915c4b2e08e744a0edf469dac59c8f85a result = valid shared = 4b82bd8650ea9b81a42181840926a4ffa16434d1bf298de1db87efb5b0a9e34e # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 3 # public key on twist curve = curve25519 private = 588c061a50804ac488ad774ac716c3f5ba714b2712e048491379a500211998a8 public = 63aa40c6e38346c5caf23a6df0a5e6c80889a08647e551b3563449befcfc9733 result = acceptable shared = b1a707519495ffffb298ff941716b06dfab87cf8d91123fe2be9a233dda22212 # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 4 # public key on twist curve = curve25519 private = b05bfd32e55325d9fd648cb302848039000b390e44d521e58aab3b29a6960ba8 public = 0f83c36fded9d32fadf4efa3ae93a90bb5cfa66893bc412c43fa7287dbb99779 result = acceptable shared = 67dd4a6e165533534c0e3f172e4ab8576bca923a5f07b2c069b4c310ff2e935b # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 5 # public key on twist curve = curve25519 private = 70e34bcbe1f47fbc0fddfd7c1e1aa53d57bfe0f66d243067b424bb6210bed19c public = 0b8211a2b6049097f6871c6c052d3c5fc1ba17da9e32ae458403b05bb283092a result = acceptable shared = 4a0638cfaa9ef1933b47f8939296a6b25be541ef7f70e844c0bcc00b134de64a # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 6 # public key on twist curve = curve25519 private = 68c1f3a653a4cdb1d37bba94738f8b957a57beb24d646e994dc29a276aad458d public = 343ac20a3b9c6a27b1008176509ad30735856ec1c8d8fcae13912d08d152f46c result = acceptable shared = 399491fce8dfab73b4f9f611de8ea0b27b28f85994250b0f475d585d042ac207 # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 7 # public key on twist curve = curve25519 private = d877b26d06dff9d9f7fd4c5b3769f8cdd5b30516a5ab806be324ff3eb69ea0b2 public = fa695fc7be8d1be5bf704898f388c452bafdd3b8eae805f8681a8d15c2d4e142 result = acceptable shared = 2c4fe11d490a53861776b13b4354abd4cf5a97699db6e6c68c1626d07662f758 # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 8 # public key = 0 curve = curve25519 private = 207494038f2bb811d47805bcdf04a2ac585ada7f2f23389bfd4658f9ddd4debc public = 0000000000000000000000000000000000000000000000000000000000000000 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # The public key is insecure and does not belong to a valid private key. Some # libraries reject such keys. # tcId = 9 # public key = 1 curve = curve25519 private = 202e8972b61c7e61930eb9450b5070eae1c670475685541f0476217e4818cfab public = 0100000000000000000000000000000000000000000000000000000000000000 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # The public key is insecure and does not belong to a valid private key. Some # libraries reject such keys. # tcId = 10 # edge case on twist curve = curve25519 private = 38dde9f3e7b799045f9ac3793d4a9277dadeadc41bec0290f81f744f73775f84 public = 0200000000000000000000000000000000000000000000000000000000000000 result = acceptable shared = 9a2cfe84ff9c4a9739625cae4a3b82a906877a441946f8d7b3d795fe8f5d1639 # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 11 # edge case on twist curve = curve25519 private = 9857a914e3c29036fd9a442ba526b5cdcdf28216153e636c10677acab6bd6aa5 public = 0300000000000000000000000000000000000000000000000000000000000000 result = acceptable shared = 4da4e0aa072c232ee2f0fa4e519ae50b52c1edd08a534d4ef346c2e106d21d60 # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 12 # edge case on twist curve = curve25519 private = 48e2130d723305ed05e6e5894d398a5e33367a8c6aac8fcdf0a88e4b42820db7 public = ffffff030000f8ffff1f0000c0ffffff000000feffff070000f0ffff3f000000 result = acceptable shared = 9ed10c53747f647f82f45125d3de15a1e6b824496ab40410ffcc3cfe95760f3b # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 13 # edge case on twist curve = curve25519 private = 28f41011691851b3a62b641553b30d0dfddcb8fffcf53700a7be2f6a872e9fb0 public = 000000fcffff070000e0ffff3f000000ffffff010000f8ffff0f0000c0ffff7f result = acceptable shared = cf72b4aa6aa1c9f894f4165b86109aa468517648e1f0cc70e1ab08460176506b # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 14 # edge case on twist curve = curve25519 private = 18a93b6499b9f6b3225ca02fef410e0adec23532321d2d8ef1a6d602a8c65b83 public = 00000000ffffffff00000000ffffffff00000000ffffffff00000000ffffff7f result = acceptable shared = 5d50b62836bb69579410386cf7bb811c14bf85b1c7b17e5924c7ffea91ef9e12 # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 15 # edge case on twist curve = curve25519 private = c01d1305a1338a1fcac2ba7e2e032b427e0b04903165aca957d8d0553d8717b0 public = eaffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f result = acceptable shared = 19230eb148d5d67c3c22ab1daeff80a57eae4265ce2872657b2c8099fc698e50 # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 16 # edge case for public key curve = curve25519 private = 386f7f16c50731d64f82e6a170b142a4e34f31fd7768fcb8902925e7d1e21abe public = 0400000000000000000000000000000000000000000000000000000000000000 result = valid shared = 0fcab5d842a078d7a71fc59b57bfb4ca0be6873b49dcdb9f44e14ae8fbdfa542 # tcId = 17 # edge case for public key curve = curve25519 private = e023a289bd5e90fa2804ddc019a05ef3e79d434bb6ea2f522ecb643a75296e95 public = ffffffff00000000ffffffff00000000ffffffff00000000ffffffff00000000 result = valid shared = 54ce8f2275c077e3b1306a3939c5e03eef6bbb88060544758d9fef59b0bc3e4f # tcId = 18 # edge case for public key curve = curve25519 private = 68f010d62ee8d926053a361c3a75c6ea4ebdc8606ab285003a6f8f4076b01e83 public = ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff03 result = valid shared = f136775c5beb0af8110af10b20372332043cab752419678775a223df57c9d30d # tcId = 19 # edge case for public key curve = curve25519 private = 58ebcb35b0f8845caf1ec630f96576b62c4b7b6c36b29deb2cb0084651755c96 public = fffffffbfffffbffffdfffffdffffffffefffffefffff7fffff7ffffbfffff3f result = valid shared = bf9affd06b844085586460962ef2146ff3d4533d9444aab006eb88cc3054407d # tcId = 20 # edge case for public key curve = curve25519 private = 188c4bc5b9c44b38bb658b9b2ae82d5b01015e093184b17cb7863503a783e1bb public = ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff3f result = valid shared = d480de04f699cb3be0684a9cc2e31281ea0bc5a9dcc157d3d20158d46ca5246d # tcId = 21 # edge case for public key curve = curve25519 private = e06c11bb2e13ce3dc7673f67f5482242909423a9ae95ee986a988d98faee23a2 public = fffffffffeffff7ffffffffffeffff7ffffffffffeffff7ffffffffffeffff7f result = valid shared = 4c4401cce6b51e4cb18f2790246c9bf914db667750a1cb89069092af07292276 # tcId = 22 # edge case for public key curve = curve25519 private = c0658c46dde18129293877535b1162b6f9f5414a23cf4d2cbc140a4d99da2b8f public = ebffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f result = valid shared = 578ba8cc2dbdc575afcf9df2b3ee6189f5337d6854c79b4ce165ea12293b3a0f # tcId = 23 # public key with low order curve = curve25519 private = 10255c9230a97a30a458ca284a629669293a31890cda9d147febc7d1e22d6bb1 public = e0eb7a7c3b41b8ae1656e3faf19fc46ada098deb9c32b1fd866205165f49b800 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 24 # public key with low order curve = curve25519 private = 78f1e8edf14481b389448dac8f59c70b038e7cf92ef2c7eff57a72466e115296 public = 5f9c95bca3508c24b1d0b1559c83ef5b04445cc4581c8e86d8224eddd09f1157 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 25 # public key with low order curve = curve25519 private = a0a05a3e8f9f44204d5f8059a94ac7dfc39a49ac016dd743dbfa43c5d671fd88 public = ecffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 26 # public key with low order curve = curve25519 private = d0dbb3ed1906663f15420af31f4eaf6509d9a9949723500605ad7c1c6e7450a9 public = edffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 27 # public key with low order curve = curve25519 private = c0b1d0eb22b244fe3291140072cdd9d989b5f0ecd96c100feb5bca241c1d9f8f public = eeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 28 # public key with low order curve = curve25519 private = 480bf45f594942a8bc0f3353c6e8b8853d77f351f1c2ca6c2d1abf8a00b4229c public = 0000000000000000000000000000000000000000000000000000000000000080 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 29 # public key with low order curve = curve25519 private = 30f993fcf8514fc89bd8db14cd43ba0d4b2530e73c4276a05e1b145d420cedb4 public = 0100000000000000000000000000000000000000000000000000000000000080 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 30 # public key with low order curve = curve25519 private = c04974b758380e2a5b5df6eb09bb2f6b3434f982722a8e676d3da251d1b3de83 public = e0eb7a7c3b41b8ae1656e3faf19fc46ada098deb9c32b1fd866205165f49b880 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 31 # public key with low order curve = curve25519 private = 502a31373db32446842fe5add3e024022ea54f274182afc3d9f1bb3d39534eb5 public = 5f9c95bca3508c24b1d0b1559c83ef5b04445cc4581c8e86d8224eddd09f11d7 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 32 # public key with low order curve = curve25519 private = 90fa6417b0e37030fd6e43eff2abaef14c6793117a039cf621318ba90f4e98be public = ecffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 33 # public key with low order curve = curve25519 private = 78ad3f26027f1c9fdd975a1613b947779bad2cf2b741ade01840885a30bb979c public = edffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 34 # public key with low order curve = curve25519 private = 98e23de7b1e0926ed9c87e7b14baf55f497a1d7096f93977680e44dc1c7b7b8b public = eeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # Curve25519 or its twist contains some points of low order. This test vector # contains a public key with such a point. While many libraries reject such # public keys, doing so is not a strict requirement according to RFC 7748. # tcId = 35 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = 0000000000000000000000000000000000000000000000000000000000000000 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 36 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = 0100000000000000000000000000000000000000000000000000000000000000 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 37 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = ecffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 38 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = 5f9c95bca3508c24b1d0b1559c83ef5b04445cc4581c8e86d8224eddd09f1157 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 39 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = e0eb7a7c3b41b8ae1656e3faf19fc46ada098deb9c32b1fd866205165f49b800 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 40 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = edffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 41 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = eeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 42 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = 0000000000000000000000000000000000000000000000000000000000000080 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 43 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = 0100000000000000000000000000000000000000000000000000000000000080 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 44 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = ecffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 45 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = 5f9c95bca3508c24b1d0b1559c83ef5b04445cc4581c8e86d8224eddd09f11d7 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 46 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = e0eb7a7c3b41b8ae1656e3faf19fc46ada098deb9c32b1fd866205165f49b880 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 47 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = edffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 48 # public key with low order curve = curve25519 private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae public = eeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000000 # tcId = 49 # public key >= p curve = curve25519 private = f01e48dafac9d7bcf589cbc382c878d18bda3550589ffb5d50b523bebe329dae public = efffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f result = acceptable shared = bd36a0790eb883098c988b21786773de0b3a4df162282cf110de18dd484ce74b # tcId = 50 # public key >= p curve = curve25519 private = 288796bc5aff4b81a37501757bc0753a3c21964790d38699308debc17a6eaf8d public = f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f result = acceptable shared = b4e0dd76da7b071728b61f856771aa356e57eda78a5b1655cc3820fb5f854c5c # tcId = 51 # public key >= p curve = curve25519 private = 98df845f6651bf1138221f119041f72b6dbc3c4ace7143d99fd55ad867480da8 public = f1ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f result = acceptable shared = 6fdf6c37611dbd5304dc0f2eb7c9517eb3c50e12fd050ac6dec27071d4bfc034 # tcId = 52 # public key >= p curve = curve25519 private = f09498e46f02f878829e78b803d316a2ed695d0498a08abdf8276930e24edcb0 public = ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f result = acceptable shared = 4c8fc4b1c6ab88fb21f18f6d4c810240d4e94651ba44f7a2c863cec7dc56602d # tcId = 53 # public key >= p curve = curve25519 private = 1813c10a5c7f21f96e17f288c0cc37607c04c5f5aea2db134f9e2ffc66bd9db8 public = 0200000000000000000000000000000000000000000000000000000000000080 result = acceptable shared = 1cd0b28267dc541c642d6d7dca44a8b38a63736eef5c4e6501ffbbb1780c033c # tcId = 54 # public key >= p curve = curve25519 private = 7857fb808653645a0beb138a64f5f4d733a45ea84c3cda11a9c06f7e7139149e public = 0300000000000000000000000000000000000000000000000000000000000080 result = acceptable shared = 8755be01c60a7e825cff3e0e78cb3aa4333861516aa59b1c51a8b2a543dfa822 # tcId = 55 # public key >= p curve = curve25519 private = e03aa842e2abc56e81e87b8b9f417b2a1e5913c723eed28d752f8d47a59f498f public = 0400000000000000000000000000000000000000000000000000000000000080 result = acceptable shared = 54c9a1ed95e546d27822a360931dda60a1df049da6f904253c0612bbdc087476 # tcId = 56 # public key >= p curve = curve25519 private = f8f707b7999b18cb0d6b96124f2045972ca274bfc154ad0c87038c24c6d0d4b2 public = daffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = cc1f40d743cdc2230e1043daba8b75e810f1fbab7f255269bd9ebb29e6bf494f # tcId = 57 # public key >= p curve = curve25519 private = a034f684fa631e1a348118c1ce4c98231f2d9eec9ba5365b4a05d69a785b0796 public = dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = 54998ee43a5b007bf499f078e736524400a8b5c7e9b9b43771748c7cdf880412 # tcId = 58 # public key >= p curve = curve25519 private = 30b6c6a0f2ffa680768f992ba89e152d5bc9893d38c9119be4f767bfab6e0ca5 public = dcffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = ead9b38efdd723637934e55ab717a7ae09eb86a21dc36a3feeb88b759e391e09 # tcId = 59 # public key >= p curve = curve25519 private = 901b9dcf881e01e027575035d40b43bdc1c5242e030847495b0c7286469b6591 public = eaffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = 602ff40789b54b41805915fe2a6221f07a50ffc2c3fc94cf61f13d7904e88e0e # tcId = 60 # public key >= p curve = curve25519 private = 8046677c28fd82c9a1bdb71a1a1a34faba1225e2507fe3f54d10bd5b0d865f8e public = ebffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = e00ae8b143471247ba24f12c885536c3cb981b58e1e56b2baf35c12ae1f79c26 # tcId = 61 # public key >= p curve = curve25519 private = 602f7e2f68a846b82cc269b1d48e939886ae54fd636c1fe074d710127d472491 public = efffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = 98cb9b50dd3fc2b0d4f2d2bf7c5cfdd10c8fcd31fc40af1ad44f47c131376362 # tcId = 62 # public key >= p curve = curve25519 private = 60887b3dc72443026ebedbbbb70665f42b87add1440e7768fbd7e8e2ce5f639d public = f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = 38d6304c4a7e6d9f7959334fb5245bd2c754525d4c91db950206926234c1f633 # tcId = 63 # public key >= p curve = curve25519 private = 78d31dfa854497d72d8def8a1b7fb006cec2d8c4924647c93814ae56faeda495 public = f1ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = 786cd54996f014a5a031ec14db812ed08355061fdb5de680a800ac521f318e23 # tcId = 64 # public key >= p curve = curve25519 private = c04c5baefa8302ddded6a4bb957761b4eb97aefa4fc3b8043085f96a5659b3a5 public = ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff result = acceptable shared = 29ae8bc73e9b10a08b4f681c43c3e0ac1a171d31b38f1a48efba29ae639ea134 # tcId = 65 # RFC 7748 curve = curve25519 private = a046e36bf0527c9d3b16154b82465edd62144c0ac1fc5a18506a2244ba449a44 public = e6db6867583030db3594c1a424b15f7c726624ec26b3353b10a903a6d0ab1c4c result = valid shared = c3da55379de9c6908e94ea4df28d084f32eccf03491c71f754b4075577a28552 # tcId = 66 # RFC 7748 curve = curve25519 private = 4866e9d4d1b4673c5ad22691957d6af5c11b6421e0ea01d42ca4169e7918ba4d public = e5210f12786811d3f4b7959d0538ae2c31dbe7106fc03c3efc4cd549c715a413 result = valid shared = 95cbde9476e8907d7aade45cb4b873f88b595a68799fa152e6f8f7647aac7957 # tcId = 67 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = 0ab4e76380d84dde4f6833c58f2a9fb8f83bb0169b172be4b6e0592887741a36 result = acceptable shared = 0200000000000000000000000000000000000000000000000000000000000000 # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 68 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = 89e10d5701b4337d2d032181538b1064bd4084401ceca1fd12663a1959388000 result = valid shared = 0900000000000000000000000000000000000000000000000000000000000000 # tcId = 69 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = 2b55d3aa4a8f80c8c0b2ae5f933e85af49beac36c2fa7394bab76c8933f8f81d result = valid shared = 1000000000000000000000000000000000000000000000000000000000000000 # tcId = 70 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = 63e5b1fe9601fe84385d8866b0421262f78fbfa5aff9585e626679b18547d959 result = acceptable shared = feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff3f # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 71 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = e428f3dac17809f827a522ce32355058d07369364aa78902ee10139b9f9dd653 result = valid shared = fcffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff3f # tcId = 72 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = b3b50e3ed3a407b95de942ef74575b5ab8a10c09ee103544d60bdfed8138ab2b result = acceptable shared = f9ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff3f # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 73 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = 213fffe93d5ea8cd242e462844029922c43c77c9e3e42f562f485d24c501a20b result = valid shared = f3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff3f # tcId = 74 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = 91b232a178b3cd530932441e6139418f72172292f1da4c1834fc5ebfefb51e3f result = valid shared = ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff03 # tcId = 75 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = 045c6e11c5d332556c7822fe94ebf89b56a3878dc27ca079103058849fabcb4f result = acceptable shared = e5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 76 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = 1ca2190b71163539063c35773bda0c9c928e9136f0620aeb093f099197b7f74e result = acceptable shared = e3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 77 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = f76e9010ac33c5043b2d3b76a842171000c4916222e9e85897a0aec7f6350b3c result = valid shared = ddffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f # tcId = 78 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = bb72688d8f8aa7a39cd6060cd5c8093cdec6fe341937c3886a99346cd07faa55 result = acceptable shared = dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 79 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = 88fddea193391c6a5933ef9b71901549447205aae9da928a6b91a352ba10f41f result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000000002 # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 80 # edge case for shared secret curve = curve25519 private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63 public = 303b392f153116cad9cc682a00ccc44c95ff0d3bbe568beb6c4e739bafdc2c68 result = acceptable shared = 0000000000000000000000000000000000000000000000000000000000008000 # Public keys are either points on curve25519 or points on its twist. # Implementations may either reject such keys or compute X25519 using the twist. # If a point multiplication is performed then it is important that the result is # correct, since otherwise attacks with invalid keys are possible. # tcId = 81 # checking for overflow curve = curve25519 private = c81724704000b26d31703cc97e3a378d56fad8219361c88cca8bd7c5719b12b2 public = fd300aeb40e1fa582518412b49b208a7842b1e1f056a040178ea4141534f652d result = valid shared = b734105dc257585d73b566ccb76f062795ccbec89128e52b02f3e59639f13c46 # tcId = 82 # checking for overflow curve = curve25519 private = c81724704000b26d31703cc97e3a378d56fad8219361c88cca8bd7c5719b12b2 public = c8ef79b514d7682677bc7931e06ee5c27c9b392b4ae9484473f554e6678ecc2e result = valid shared = 647a46b6fc3f40d62141ee3cee706b4d7a9271593a7b143e8e2e2279883e4550 # tcId = 83 # checking for overflow curve = curve25519 private = c81724704000b26d31703cc97e3a378d56fad8219361c88cca8bd7c5719b12b2 public = 64aeac2504144861532b7bbcb6c87d67dd4c1f07ebc2e06effb95aecc6170b2c result = valid shared = 4ff03d5fb43cd8657a3cf37c138cadcecce509e4eba089d0ef40b4e4fb946155 # tcId = 84 # checking for overflow curve = curve25519 private = c81724704000b26d31703cc97e3a378d56fad8219361c88cca8bd7c5719b12b2 public = bf68e35e9bdb7eee1b50570221860f5dcdad8acbab031b14974cc49013c49831 result = valid shared = 21cee52efdbc812e1d021a4af1e1d8bc4db3c400e4d2a2c56a3926db4d99c65b # tcId = 85 # checking for overflow curve = curve25519 private = c81724704000b26d31703cc97e3a378d56fad8219361c88cca8bd7c5719b12b2 public = 5347c491331a64b43ddc683034e677f53dc32b52a52a577c15a83bf298e99f19 result = valid shared = 18cb89e4e20c0c2bd324305245266c9327690bbe79acb88f5b8fb3f74eca3e52 # tcId = 86 # private key == -1 (mod order) curve = curve25519 private = a023cdd083ef5bb82f10d62e59e15a6800000000000000000000000000000050 public = 258e04523b8d253ee65719fc6906c657192d80717edc828fa0af21686e2faa75 result = valid shared = 258e04523b8d253ee65719fc6906c657192d80717edc828fa0af21686e2faa75 # tcId = 87 # private key == 1 (mod order) on twist curve = curve25519 private = 58083dd261ad91eff952322ec824c682ffffffffffffffffffffffffffffff5f public = 2eae5ec3dd494e9f2d37d258f873a8e6e9d0dbd1e383ef64d98bb91b3e0be035 result = acceptable shared = 2eae5ec3dd494e9f2d37d258f873a8e6e9d0dbd1e383ef64d98bb91b3e0be035